Used price: $3.95
Collectible price: $6.31
Buy one from zShops for: $5.98
Great examples!
Great insights!
Great organization!
Sams marketing team is asleep at the wheel on this one. This book should be packaged with the FrontPage software and there should be in store promotions everywhere! William, find a new publisher. Sams is doing you a disservice.
Used price: $0.05
Buy one from zShops for: $2.00
Used price: $3.45
Collectible price: $9.99
"Northrop Frye on Shakespeare" is targeted for the general reader. Frye's commentary helps any reader understand the Bard, but it does so in a more accessible style than any other work I have read by Frye. Ideally suited for the high school student or the college undergraduate, Frye's essays provide excellent entry points into many of Shakespeare's plays for the student who wishes to delve further into these essential works. Not exhaustive like Bloom's "Shakespeare: The Invention of the Human," or scholarly and advanced like Cavell's "Disowning Knowledge," Frye's work invites the reader to ponder some key points and formulate her own ideas.
This collection of essays complements the other works mentioned in this review. As an introductory set of essays on Shakespeare, it is without peer.
Used price: $5.00
Collectible price: $8.99
Buy one from zShops for: $7.99
Klaber's wired-in work makes all the others' works putter off into nattering nabobs of nonsensical noise as he delicately delves into this June 4, 1968 seminal tragedy. Klaber kooks the krime and katers to only the most diskriminating kats.
What's Klaber writing about now?
Used price: $110.92
the book reads simply.
not just for anarchists; everyone should be exposed to this thinking. what you can do for yourself.
-my quick, abbreviated 2 cents. (read it for yourself, duh)
List price: $110.00 (that's 30% off!)
Used price: $68.28
Buy one from zShops for: $76.45
Be warned, this book also contains extensive technical information, so if you are interested in narrative storytelling look elsewhere. This book is for the true devotee of battleships.
Used price: $0.64
Collectible price: $1.00
Used price: $4.00
Collectible price: $5.29
Buy one from zShops for: $8.98
Sit back, fasten your seatbelt and go back to Mississippi after the Civil War. It's a tough place to visit, you sure would not want to live there. Eianr E. Kvaran
Hair does a remarkable job of pulling together the obscure and little-known facts about "Robert Charles", an obscure and little-known historical figure who would have quickly made himself perfectly at home in 1960s America. More importantly, Hair's research and narrative provide a brilliant portrait of a period of American history, approaching the mystery of Robert Charles through a necessarily oblique but dead-on examination of turn of the century racial etiquette in the South; Afro-American attitudes regarding racism, self-defense, identity, militancy, and politics; state and regional economic issues; and the pathological behavior of the white victims of supremacist theories and beliefs. Although the question of who, exactly, was Robert Charles cannot be completely answered---if it could, Hair would have done it---the question of WHY did Robert Charles exist and die as he did is effectively answered through a compelling narrative that proves that history and its writing can be as exciting as any modern story of injustice, oppression, personal dignity in the face of ultimate destruction, and right beaten to ground by actual numerical, and assumed racial, superiority. Hair deserves to be honored for his detective work and meticulous research as well as his ability to make about two hundred pages do the work of some who would have said the same thing, and less eloquently, in six hundred. He should also be commended for refusing to let anything but historical facts and sound reasoning fill in the blank spaces in his history because the temptation to make assumptions in order to flesh out Charles' story must have been a consideration during the writing of the book. This is a small, well-written, rewarding examination of a historical figure and the times that he lived and died in. It's surprising to me that no one has made a movie based upon the book since it has all the drama, suspense, tension, tragedy, and action anyone could possibly hope for regarding a historical figure whose pledge to live and die like a man was a sacred vow and, perhaps, a moral lesson. For those who are aware of Robert F. Williams' place in Afro-American history, Robert Charles will be recognized both as of his time and ahead of it, helping to lay a foundation for the future struggles of others.
Considering the fact that Hair first published this book in the late 1970s or very early 1980s, I am amazed that there are so few reviewers of it. I fervently hope that the lack of reviews is not an indication of a lack of readers for this important historical work.
List price: $49.95 (that's 30% off!)
Used price: $24.00
Buy one from zShops for: $24.99
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.
While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.
Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
Contents:
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
The Bottom Line:
It is not just a good book, it is the best book among high level network security books, and the only that compares with specialized papers. Only quite easier.
I got more than 60 papers on buffer overflows. None compares with the classical 'Smashing The Stack For Fun And Profit' by Aleph One. IMHO, however, the corresponding chapter from this book, does compare and is really easier to understand.
Finally, the 'piece de resistance' of the book, is the chapter about Spoofing. Really enjoyed it, and by the way got surprised reading the innovative (to me) technique to 'Spoof Connectivity Through Asymmetric Firewalls'. Good Job Dan ;-)
As an added bonus, as an owner of this book, you'll find a lot of code files, applications and links...